Query for Crypto Junkies

[chan] general
Aug 8 09:53

I am looking for the heaviest, most memory and processor intensive secure encryption algorithms available. I need: Symmmetric key ciphers Assymmetric keypair ciphers Digital signature schemes Key exchange schemes Secure message digests Additional algorithms and ECC curves that will install to GPG and OpenSSL. preferably in libraries that have an optional command-line interface. new, novel, or unique is ok. Please advise me. I want to try different things for a secret project.

[chan] Crypto-Anarchist Federation
Aug 10 07:00

use OTP, it cannot be broken

BM-2cWZW87PJN5VZjtJCpk3hXcYefhNCxdjU6
Aug 10 10:18

The problems are not crypto, but as Snowden said, the problem is having a secure end-point, which don't exist yet with current computers architectures. Have a look at the work we are doing for BitMessage software, we created a Secure End-Point with open-hardware and open-core (FPGA based Free Integrated Circuits) that will correct all known major security / anonymity issues : https://blogs.mediapart.fr/stman/blog/090717/snowdens-dream-bitmessage-secure-station-open-hardware-open-core-project https://blogs.mediapart.fr/stman/blog/090717/torvpn-fingerprinting-family-anonymity-breach-fix-custom-fpga-based-ic By the way, I have to rephrase a little bit those two articles. Some problems solved are missing in them. For example, we are going to include a custom made RNG in the second FPGA used as a firewall/proxy between the two Raspberry Pi. Regards,

[chan] Crypto-Anarchist Federation
Aug 10 10:20

True. But you can't exchange keys over a wire. And you need lots of big keys.

[chan] Crypto-Anarchist Federation
Aug 10 10:23

"Use OTP" is the common refrain of those who've never tried to actually use it. The fact is it's only useful for short, occasional messages like you'd receive if you were, say, a Soviet spy.

[chan] Crypto-Anarchist Federation
Aug 10 10:23

This sounds great! What is Stman short for?

[chan] Crypto-Anarchist Federation
Aug 10 10:24

What if there was a way to blindly construct identical one time pads without key exchange?

BM-2cWZW87PJN5VZjtJCpk3hXcYefhNCxdjU6
Aug 10 10:25

ATARI ST and MAN gives STMAN Old school electronician and low level programming hacker :-)

[chan] Crypto-Anarchist Federation
Aug 10 10:27

luvz old ataris. In the USA the department stores now sell clones of the original atari gaming consoles. Can you believe that? My first computer was a Tandy CoCo. There was no operating system. To make it do anything you have to program it in BASIC.

[chan] Crypto-Anarchist Federation
Aug 10 11:15

That's a contradiction in itself: OTP only works with random numbers, but if you can construct anything, it cannot be random. OTP with pseudorandom numbers is probably even worse than using a bad cypher.

[chan] Crypto-Anarchist Federation
Aug 10 13:35

we have been using it for many years, never had any trouble

[chan] Crypto-Anarchist Federation
Aug 10 13:46

you mean something like rule30. would that be safe enough?

[chan] Crypto-Anarchist Federation
Aug 10 14:46

(((rule30))) what is this rule30, komerade?

[chan] Crypto-Anarchist Federation
Aug 10 15:08

not by itself. if one used rule 30 on a branching set of binary fields and the material after -n branchings was used as key material, yes. this method would force the computer to fill up memory, making the key generator a memory-hard function with high latency. brute forcing it would be futile. After initial key generation, each communication would exchange another encoded set of branching rules to generate the keys for the next exchange. This would provide forward secrecy. It would also cause increasing noise in each new set of keys. When Bob gets a message from Alice the parameters for further branching the field two steps are encoded in the message. Bob then branches the field to create 3 keys. The third key is the encryption key for the next exchange. The second key is a throwaway key. The first key encrypts the return message and its encoded parameters. Recipient has parameters for this already. The throwaway key is used to encrypt the return message again. Alice already has parameters for this. The third key is included in the payload, and re-encrypted with the throwaway key once more. Alic unwraps with her throwaway key, gets the third key, from which she'll branch and create new parameters. Then she unwraps the rest. Return trip begins with third key Alice just obtained. Since Bob has the third key he knows the next two parameter sets for branching into the next two keys. This time Alice sets the branching parameters from #3, and return message contains it all for Bob to unwrap. this is every bit as secure as OTP, like you would have to unwind every fractal in the universe to decipher it.

[chan] Crypto-Anarchist Federation
Aug 11 08:32

LMGTFY: https://en.wikipedia.org/wiki/Rule_30

[chan] Crypto-Anarchist Federation
Aug 11 10:38

thank you for providing these details.

[chan] Crypto-Anarchist Federation
Aug 11 21:29

(((LMGTFY))) what is this, komerade?

[chan] Crypto-Anarchist Federation
Aug 12 01:21

https://lmgtfy.com/?q=lmgtfy Such meta.

[chan] Crypto-Anarchist Federation
Aug 12 01:37

So when you introduce a concept to conversation that most people in the room would not be familiar with, you expect them to research it instead of providing a short explanation? I see.

[chan] Crypto-Anarchist Federation
Aug 13 16:49

i expect intelligent people taking part in such discussions to do their own research.

[chan] Crypto-Anarchist Federation
Aug 14 08:37

+1 We have not time to loose teaching people 1+1=2. Fascists nazi CIA feds love playing stupid people to make us loose our time.

[chan] Crypto-Anarchist Federation
BM-2cWdaAUTrGZ21RzCpsReCk8n86ghu2oY3v

Subject Last Count
4.1 Billion Password dump. Dec 14 02:12 3
what the fuck Dec 12 05:58 2
The Revolution of Crypto-Anarchism is to design and spread rapidly a non-paradoxal cyberspace. Dec 11 16:06 2
Radical Muslims with to create a totalitarian caliphate Dec 10 23:24 5
If I use P2P networks like eMule on the Whonix operating system, is it possible for them to leak my real IP address? Dec 9 22:29 2
level water disproves globe theory Dec 9 17:35 1
Globe Earthers Spend More Effort Opposing the Flat Earth Than They Spend Opposing Child Molestors. Dec 9 14:16 1
Former NASA Scientist Confirms the Flat Earth What he said will Amaze You Dec 9 14:11 1
Celtic Kyrie Irving Trolls Globe Worshippers Dec 9 13:48 1
48 Dirty Little Secrets Cryptographers Don't Want You to Know Dec 5 23:53 3
I'm back. Dec 5 23:53 1
Kaspersky Internet Security 2018 - Multi-Device (Windows, MAC, Android) Activation Codes BIG Sale Dec 5 00:48 1
Machine Learning Image Steganalysis: Aletheia Dec 4 17:24 2
34C3 Dec 2 12:49 1
CIPHER Dec 2 09:04 2
GPG supports ECC keys Dec 2 05:15 31
OMEGA release 39 is available for download Dec 1 11:33 1
DUAL_EC_DRBG - is a controversial pseudorandom number generator (PRNG) designed and published by the NSA Nov 27 14:53 1
(Facebook) Mark Zuckerberg is a female Nov 27 03:40 1
Steve Jobs outed as tranny Nov 27 03:32 1
Kaspersky Internet Security 2018 - Activation Codes BIG Sale Nov 27 02:53 1
The Homosexual Perversion: A Jewish Criminal Simhke for the Postmodern Corporate Conformist Nov 25 03:03 2
Anonymous Publication of a Proof of Work Algorithm Nov 24 22:52 1
Shadow Brokers Nov 24 12:33 1
{ FOXY DOX } Cicada 3301 - email dump Nov 24 03:19 4
where is latest mammoth BM chan list ? larger than beamstat.com ? Nov 23 22:26 1
OKAY WHAT THE HELL IS GOING ON WITH THE FLAT EARTH SPAM? Nov 23 16:54 6
I wanna be a homosexual. Nov 23 16:54 1
wikileaks vault 8 Nov 23 01:10 1
Migrated to bitmessage from fecesbook Nov 23 01:10 2
Thougths about Crypto-Anarchism, and the Cyber-Space paradox with the meat space. Nov 18 13:06 2
Tor replacement Nov 18 03:32 3